Hacking Tutorials?

Home » Programming & Design » Hacking Tutorials?
Programming & Design No Comments

HiI actually want to learn hacking from basics to advance. But don't know from where to start. Where can I learn the basics from scratch (forums, sites, online tutorials etc) and proceed in advance of this course ?
My intention of learning hacking is for security and all whit purposes. Please help and

HiI actually want to learn hacking from basics to advance. But don't know from where to start. Where can I learn the basics from scratch (forums, sites, online tutorials etc) and proceed in advance of this course ?
My intention of learning hacking is for security and all whit purposes. Please help and THankS.:-)
HiI actually want to learn hacking from basics to advance. But don't know from where to start. Where can I learn the basics from scratch (forums, sites, online tutorials etc) and proceed in advance of this course ?
My intention of learning hacking is for security and all white purposes. Please help and

HiI actually want to learn hacking from basics to advance. But don't know from where to start. Where can I learn the basics from scratch (forums, sites, online tutorials etc) and proceed in advance of this course ?
My intention of learning hacking is for security and all white purposes. Please help and THankS.:-)

Other answer:

Chandan:
Hacking is a subject that is broadly defined.

There is the term hack that I tend to use in that somebody uses some code to do something in an unconventional manner or in an inefficient manner. For example, "This guy just started game programming. He is using DoEvents as a busy wait to try to keep the FPS at 16, what a hack!"

There is the term that movie directors(and anonymous) try to portray as this undercover computer programmer with some very high level knowledge of low level programming that allows them to break an encryption or help some foreign nation expose the biggest secret in the world about the largest bank. This type of hacking in reality rarely deals with code and more with diligently observing situations and/or waiting for somebody to slip up. For example, there are people who will contact a company that the person that they're trying to hack is associated with like their internet provider, cell phone carrier, etc. They will then use tactics like playing a YouTube video on repeat of a baby crying and play as if they're either the person who they're targeting or their spouse and try to convince the representative that they're talking to that they need to either be added as a user or change their password or a number of other things. Then from there they may have access to the user's personal information. You'd be surprised at how many representatives want to help a "newly married wife with a baby crying in the background."

Finally there are those that create viruses/bots and things of this nature. The easiest method is to get the user to download something. This is why software like torrents are a haven for viruses, people are willfully downloading stuff. Once the user downloads the software it may affect the user's registry or perhaps it will lock all the files and inform the user that they must pay some fee to have access back to their files or they will be permanently deleted. Another example would be somebody who just creates a key logger that looks for things like when a user logs into their bank, then it will get their username and password.

If you want to become any version other than my first version mentioned, get ready for a life of crime and possible jail time. In my humble opinion, as exotic as the movies make it out to be… it is not worth it.

Andi:
Define Hacking…

At a basic level,
it is just using any unexpected method 'that works anyway' to get a result….
eg using a knife to undo a screw when you don't have screwdriver ….

if what you mean is the ability to 'break into' systems…
Then that comes from experience, and practice at seeing where people leave systems insecure.

The classic is older systems used to come with predefined users (guest, service etc) and already enabled with 'default' passwords.

edit: look even still exists today !
http://www.theregister.co.uk/2016/03/29/…

Now if the new users / installers don't know about these (due to lack of experience) or because they think there is no risk / forget… then these are backdoors left open into systems.

Even today, some unix systems have Line Printer 'users' with passwords left off or open.
or have unitilties that have 'holes' or other utilities installed with excessively high priviledge etc
or
SSH/TLS etc installed with poorly secured / out of date certicates

There are courses on Ethical Hacking
and books on basics of systems communications.

A good read is the old old book 'The Cookoo's egg'
https://en.wikipedia.org/wiki/The_Cuckoo…
that describes someone tracking down one of the early hackers (from the other side – being hacked) and also bumping into one of the first world wide Virus's (!)

Certificate of Ethical Hacking
https://www.eccouncil.org/Certification/…

how to become an Ethical Hacker
http://www.pcworld.com/article/250045/how_to_become_an_ethical_hacker.html

Edit: :Look up books by "kevin mitnick" – infamous hacker (banned from computers for many years)
https://www.mitnicksecurity.com/S=0/shopping/books-by-kevin-mitnick

Todd:
You can just go to Barnes and Noble. They always have plenty of books on topics like that. The only thing is you might end up looking in the wrong places. The hacker experts might actually be hacks, lol.
Chris:
If you have what it takes to learn how to hack, you don't need to ask yahoo answers how to start. You have access to the internet, that's all you need.

LEAVE A COMMENT